CVE-2017-20175 – mediawiki/matomo
Package
Manager: composer
Name: mediawiki/matomo
Vulnerable Version: >=0 <2.4.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00063 pctl0.19876
Details
Cross-site Scripting in DaSchTour matomo-mediawiki-extension A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The name of the patch is 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203.
Metadata
Created: 2023-02-05T21:30:25Z
Modified: 2023-10-20T22:01:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-hc67-v29c-7g78/GHSA-hc67-v29c-7g78.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-hc67-v29c-7g78
Finding: F425
Auto approve: 1